Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[TEST] OvmfPkg: Update for TDVF #5640

Draft
wants to merge 4 commits into
base: master
Choose a base branch
from

Conversation

sunceping
Copy link
Contributor

No description provided.

@sunceping sunceping force-pushed the disableS3intdvf.v1 branch 3 times, most recently from 0c78aca to ffca56b Compare May 9, 2024 01:46
@sunceping sunceping force-pushed the disableS3intdvf.v1 branch 4 times, most recently from 3ddf9a2 to 96b8642 Compare May 30, 2024 07:36
Refer to the section 2.1 of tdx-virtual-firmware-design-guide spec,
APCI S3 is not supported in Tdx-Guest.

Therefore, TDVF should not read the S3 status via fw_cfg and always
set it as unsupported.

spec: https://cdrdv2.intel.com/v1/dl/getContent/733585

Cc: Erdem Aktas <[email protected]>
Cc: Jiewen Yao <[email protected]>
Cc: Min Xu <[email protected]>
Cc: Gerd Hoffmann <[email protected]>
Cc: Elena Reshetova <[email protected]>
Signed-off-by: Ceping Sun <[email protected]>
In the current code, TDVF reads the PcdSetNxForStack value via fw_cfg ,
but overwrites it with a fixed value after the read is complete.

In this patch, TDVF removes the extra logic code.

Cc: Erdem Aktas <[email protected]>
Cc: Jiewen Yao <[email protected]>
Cc: Min Xu <[email protected]>
Cc: Gerd Hoffmann <[email protected]>
Cc: Elena Reshetova <[email protected]>
Signed-off-by: Ceping Sun <[email protected]>
Currently, TDVF gets LowMemory and FistNonAddress from the e820tables
via fw_cfg, while TD-Hob can also provide the memory info of LowMemory
and FistNonAddress.

From the security perspective, e820tables is the external data from VMM
and is untrusted, while TdHob was measured in early phase by TDVF.

Therefor TDVF use TdHob instead of e820tables to get the memory info.

Cc: Erdem Aktas <[email protected]>
Cc: Jiewen Yao <[email protected]>
Cc: Min Xu <[email protected]>
Cc: Gerd Hoffmann <[email protected]>
Cc: Elena Reshetova <[email protected]>
Signed-off-by: Ceping Sun <[email protected]>
Currently, PlatformReservationConflictCB have comments
“This happens on (virtual) AMD machines with 1TB address space,
 because the AMD IOMMU uses an address window just below 1TB.”

Based on the comments, it should not be invoked in TDVF.

Cc: Erdem Aktas <[email protected]>
Cc: Jiewen Yao <[email protected]>
Cc: Min Xu <[email protected]>
Cc: Gerd Hoffmann <[email protected]>
Cc: Elena Reshetova <[email protected]>
Signed-off-by: Ceping Sun <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant